General
-
Target
3059becc3afcd2f2df263ecde8b8a1e66a615054b2f75467cf01115c38e52829
-
Size
1.4MB
-
Sample
220621-exva7adfe7
-
MD5
81e104d01fb9e6cb37147936a288c999
-
SHA1
d07bc69167b4f6b541ca44828d725e1ee109d247
-
SHA256
3059becc3afcd2f2df263ecde8b8a1e66a615054b2f75467cf01115c38e52829
-
SHA512
f74a85936d2fab33be6a399ec6416d1438952ae9f606bbae1971d7119ab78cdcba232380673aedd4d69a7460b2150a49965802271da61954ff2ed91c56157584
Static task
static1
Behavioral task
behavioral1
Sample
3059becc3afcd2f2df263ecde8b8a1e66a615054b2f75467cf01115c38e52829.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3059becc3afcd2f2df263ecde8b8a1e66a615054b2f75467cf01115c38e52829.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
3059becc3afcd2f2df263ecde8b8a1e66a615054b2f75467cf01115c38e52829
-
Size
1.4MB
-
MD5
81e104d01fb9e6cb37147936a288c999
-
SHA1
d07bc69167b4f6b541ca44828d725e1ee109d247
-
SHA256
3059becc3afcd2f2df263ecde8b8a1e66a615054b2f75467cf01115c38e52829
-
SHA512
f74a85936d2fab33be6a399ec6416d1438952ae9f606bbae1971d7119ab78cdcba232380673aedd4d69a7460b2150a49965802271da61954ff2ed91c56157584
Score8/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-